A federal agency is deploying a new information system that will process, store, and transmit personally identifiable information (PII). According to the NIST Risk Management Framework (RMF), which of the following steps must be completed FIRST to determine the necessary level of security controls?